anti-terror risk assessment matrix

A powerful risk and threat assessment model

​We began business by creating our automated critical infrastructure protection software, ATRiM. While that software is still available for very specific risk environments, our manual audits are more powerful to provide a deep dive into the security configuration at a site in all aspects of security. Additionally, the manual audits allow us to work directly with our client and teach them some basics of our Auditing process so they can continually update their infrastructure protection on their own.​

The Auditing process for both automated and manual methods is the same. An ATRiM auditing specialist conducts a preliminary review of the site, including interviews with personnel. A profile of the site functions and operations, including the wider threat environment around the facility, leads to an Auditing schedule. The specialist, in conjunction with the client, then assembles a small, vetted security team, comprising key personnel at the client organization, who then use the Audit protocols to collect data at every level of the site. This includes daytime and night-time audits, external and internal reviews, and assessments of personnel and security operations. ​

​​​The results of the audit are compiled into a summary chart that is provided to the client in a detailed report. The report delivery to the client includes a list of priorities, suggestions for improvement, and the development - or enhancement - of current security procedures. This may include engineering and architectural redesigns, new security technology and operations, internal reviews of screening and training, the impact of organizational culture on the threat environment, and a list of next steps.